You do not have permission to delete messages in this group
Copy link
Report message
Show original message
Either email addresses are anonymous for this group or you need the view member email addresses permission to view the original message
to Wazuh mailing list
Hi,
While I writing a rule I need to compare the filename with a cdb list that include whole the malware files list. For that I need to create a cdb list of malware files name.Where should I can collect that malware filenames.
Pacome Kemkeu
unread,
Apr 10, 2023, 3:43:27 AM4/10/23
Reply to author
Sign in to reply to author
Forward
Sign in to forward
Delete
You do not have permission to delete messages in this group
Copy link
Report message
Show original message
Either email addresses are anonymous for this group or you need the view member email addresses permission to view the original message
to Wazuh mailing list
Hello Sinu,
Here is a list of publicly available malware databases with their website links where you can collect malware names and other IOCs:
However, I would like to highlight that comparing file names might not be a good method for malware hunting since file names can change and be subject to numerous false positives (File names are usually not considered as IOCs in threat hunting). Instead I'll recommend you use hashes for comparison. There is this blog post that shows how to detect and delete malicious files using a CDB list of their MD5 hashes . In the blog post, you also have a method to generate a large CDB list of malware hashes using a single command.
I hope you find this helpful.
Sinu Soman
unread,
Apr 10, 2023, 4:11:24 AM4/10/23
Reply to author
Sign in to reply to author
Forward
Sign in to forward
Delete
You do not have permission to delete messages in this group
Copy link
Report message
Show original message
Either email addresses are anonymous for this group or you need the view member email addresses permission to view the original message
to Wazuh mailing list
Hello
Pacome Kemkeu,
Thank you for your valuable reply. You are right comparing the hashes of the file is the best way and also it will avoid numerous false positives. But in my logs there is no hashes to compare. Do you have any idea to solve this.
Pacome Kemkeu
unread,
Apr 10, 2023, 5:11:02 AM4/10/23
Reply to author
Sign in to reply to author
Forward
Sign in to forward
Delete
You do not have permission to delete messages in this group
Copy link
Report message
Show original message
Either email addresses are anonymous for this group or you need the view member email addresses permission to view the original message
to Wazuh mailing list
In that case, you can proceed to compare file names. But, can you please give more insights on what you are trying to perform and how you are collecting your logs? Also maybe provide a sample of your log and your current rules. These can be helpful in solving your issue.
Sinu Soman
unread,
Apr 10, 2023, 5:56:07 AM4/10/23
Reply to author
Sign in to reply to author
Forward
Sign in to forward
Delete
You do not have permission to delete messages in this group
Copy link
Report message
Show original message
Either email addresses are anonymous for this group or you need the view member email addresses permission to view the original message
to Wazuh mailing list
In my case I have malware log file and it has a fieldname called "application name" and "filename". I need to be alerted if an blacklisted filename is detected in my system.